Author: Gregory Maxwell 2016-06-28 19:55:37
Published on: 2016-06-28T19:55:37+00:00
The BIP37 bloom filters should be removed from the protocol as they lack value. However, the BIP151 is necessary for network participant privacy and authenticated links. The proposal is an ephemerally keyed opportunistic encryption system, not an identity system. Without something like BIP151, manually curated links cannot provide protection against partitioning sybils. Additionally, the protocol may become faster with the implementation of BIP151. While there are no significant key distribution problems in the mining and high-value systems case, a future auth BIP is expected to address the issue well.
Updated on: 2023-05-19T23:34:48.433109+00:00